Netkiller DLP

Netkiller DLP

Netkiller
+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,506 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

Automatically uncover your attack surface by leveraging attackers’ perspectives for proactive protection. Neutralize risk by monitoring your case objectives and assets so that your teams can get actionable intelligence that prevents crimes. We help companies proactively detect and remediate relevant cyber threats, reducing manual workload and enhancing cybersecurity ROI. Strengthen nation-state defenses. Access targeted, actionable intelligence for countering diverse cyber threats. Utilize rich on-premises data and expert insights to enhance efficiency, reduce false positives, and streamline threat profiling. Discover your attack surface from the attacker’s view. Analyze the adversary’s perspective of your company. This comprehensive understanding allows you to assess the level of risk your organization faces and to prioritize security measures accordingly. Combat digital fraud involving online payments, refunds, bank cards, loyalty programs, and more.

About

We help every business to evolve in the cloud by bringing the best for Cloud Security because no business should be stopped by a security concern in the post-pandemic era. We provide industry-leading customization for your organization’s specific needs. From enterprise-level security protocols to affiliate integration, we offer services tailored to your business. Collavate was developed, at its core, for Google Workspace. It allows you to cultivate discussion, rapidly iterate, and submit assets for approval all in one place. Netkiller ISMS offers real-time data breach detection, immediate quarantine, and data access location logs. It offers unparalleled tracing and detection, with industry-leading AI reporting all through any Google Workspace Edition. KillerID provides individual or integrated cloud user logins in conjunction with home or office users from your Google Login. Create custom login security policies, IP filtering, and access limitations to private cloud services.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises interested in a solution to monitor, hunt and mitigate cyber crimes

Audience

Organizations that need a real-time Data Loss Prevention solution for G Suite Google Drive to monitor sensitive contents shared with internal and external organizations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

KELA Cyber
Founded: 2015
Israel
www.kelacyber.com

Company Information

Netkiller
Founded: 2006
United States
www.dlp.netkiller.com

Alternatives

Alternatives

Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Data Loss Prevention Features

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Integrations

No info available.

Integrations

No info available.
Claim KELA Cyber Intelligence Platform and update features and information
Claim KELA Cyber Intelligence Platform and update features and information
Claim Netkiller DLP and update features and information
Claim Netkiller DLP and update features and information